Android Mobile Devices Context Based Access Control Systems

Authors

  • A Mounika Department of Computer Science & Engineering, PACE Institute of Technology & Sciences, Ongole, Andhra Pradesh, India Author
  • Choppara Sudheer Babu Department of Computer Science & Engineering, PACE Institute of Technology & Sciences, Ongole, Andhra Pradesh, India Author
  • Bandaru Ananda Babu Department of Computer Science & Engineering, PACE Institute of Technology & Sciences, Ongole, Andhra Pradesh, India Author
  • Ungarala Lohith Kumar Department of Computer Science & Engineering, PACE Institute of Technology & Sciences, Ongole, Andhra Pradesh, India Author
  • K Jaswanth Kumar Department of Computer Science & Engineering, PACE Institute of Technology & Sciences, Ongole, Andhra Pradesh, India Author

DOI:

https://doi.org/10.55524/ijirem.2023.10.2.25

Keywords:

Android Mobile, Smart Phone, Security And Privacy, Context Based Access Control

Abstract

The Mobile applications designed for An droid frequently have access to private information and re sources stored on the user's device. The improper use of this  data by malicious programs has the potential to result in  breaches of privacy as well as the disclosure of sensitive  data. An example of this would be a malicious application  capturing a confidential business chat in the background  without the user's knowledge. The issue is caused by the fact  that Android users do not have control over the capabilities  of programs once those applications have been granted the  desired access during installation. This is what causes the  problem. It is necessary for us to have a context-based ac cess control mechanism so that privileges can be dynamical ly provided or revoked to applications based on the specific  context of the user. This is because there are numerous situa tions in which the possibility that an application will be al lowed a privilege is contingent on the specific context of the  user. In this article, we suggest an access control system  along these lines. Our implementation of context distin guishes between subareas that are geographically adjacent to  one another within the same location. We have made certain  changes to the Android operating system in order to enable  context-based access control limitations, which can then be  set and implemented. We have carried out a number of tests  in order to evaluate both the efficacy of our access control  mechanism and the precision of context recognition.

Downloads

Download data is not yet available.

References

Ali-Gombe, Aisha, et al. "AspectDroid: Android app analysis system." Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy. 2016.

Shrivastava, Gulshan, et al. "Privacy issues of android applica tion permissions: A literature review." Transactions on Emerg ing Telecommunications Technologies 31.12 (2020): e3773.

Cao, Weicheng, et al. "A large scale study of user behavior, expectations and engagement with Android permissions." 30th USENIX Security Symposium (USENIX Security 21). 2021.

Wikipedia, “Samsung galaxy s4 specifications,” http://en.wikipedia.org/wiki/Samsung Galaxy S4, May 2013 [5] Talal, Mohammed, et al. "Comprehensive review and analysis

of anti-malware apps for smartphones." Telecommunication Systems 72 (2019): 285-337.

A. Kushwaha and V. Kushwaha, “Location based services us ing android mobile operating system,” International Journal of Advances in Engineering and Technology, vol. 1, no. 1, pp. 14–20, 2011.

J. Leyden, “Your phone may not be spying on you now – but it soon will be,” http://www.theregister.co.uk/2013/04/24/kaspersky mobile malware infosec/, April 2013.

R. Templeman, Z. Rahman, D. J. Crandall, and A. Kapadia, “Placeraider: Virtual theft in physical spaces with smartphones,” CoRR, vol. abs/1209.5982, 2012.

Wang, Chenwei, et al. "GPS 5.0: an update on the prediction of kinase-specific phosphorylation sites in proteins." Ge nomics, Proteomics & Bioinformatics 18.1 (2020): 72-80.

Demissie, Biniam Fisseha, Mariano Ceccato, and Lwin Khin Shar. "Security analysis of permission re-delegation vulnera bilities in Android apps." Empirical Software Engineering 25 (2020): 5084-5136.

Downloads

Published

2023-04-30

How to Cite

Android Mobile Devices Context Based Access Control Systems . (2023). International Journal of Innovative Research in Engineering & Management, 10(2), 125–129. https://doi.org/10.55524/ijirem.2023.10.2.25